IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 728 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
VLD, HWS, ICD 2024-03-01
10:50
Okinawa
(Primary: On-site, Secondary: Online)
Pseudo-random Number Generator Design Robust against Fault Injection Attacks
Sota Kado, Mingyu Yang, Yuko Hara (Tokyo Tech) VLD2023-123 HWS2023-83 ICD2023-112
Fault Injection Attacks (FIA) using physical methods are a significant threat for embedded devices to process various ap... [more] VLD2023-123 HWS2023-83 ICD2023-112
pp.125-130
VLD, HWS, ICD 2024-03-01
11:40
Okinawa
(Primary: On-site, Secondary: Online)
Improved Ring Oscillator Sensor for Laser Fault Injection Detection on FPGA
Masaki Chikano (YNU), Shungo Hayashi, Junichi Sakamoto (YNU/AIST), Tsutomu Matsumoto (YNU) VLD2023-125 HWS2023-85 ICD2023-114
A fault attack is an attack that intentionally injects a fault into an operating device in order to leak internal confid... [more] VLD2023-125 HWS2023-85 ICD2023-114
pp.135-140
VLD, HWS, ICD 2024-03-02
11:40
Okinawa
(Primary: On-site, Secondary: Online)
eFPGA-based IP Protection of Embedded Processor Design
Tomosuke Ichioka, Tanvir Ahmed, Yuko Hara (Tokyo Tech) VLD2023-139 HWS2023-99 ICD2023-128
As manufacturing costs continue to grow, IC manufacturers are increasingly outsourcing IC manufacturing to third-party f... [more] VLD2023-139 HWS2023-99 ICD2023-128
pp.209-214
IA 2024-01-25
16:10
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Router Security Assessment Using CAPEC Vulnerability Assessment Criteria
Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) IA2023-62
Our research addresses the nexus of router performance and security in contemporary cyberinfrastructure. Routers, pivota... [more] IA2023-62
pp.30-36
SIP, IT, RCS 2024-01-19
13:30
Miyagi
(Primary: On-site, Secondary: Online)
[Invited Talk] Problem of Adversarial Attacks on CNN-based Image Classifiers and Countermeasures
Minoru Kuribayashi (Tohoku Univ.) IT2023-67 SIP2023-100 RCS2023-242
It is well-known that discriminative models based on deep learning techniques may cause misclassification if adversarial... [more] IT2023-67 SIP2023-100 RCS2023-242
p.204
EMM 2024-01-16
14:25
Miyagi Tohoku Univ.
(Primary: On-site, Secondary: Online)
Comparison of multi-factor authentication and improved authentication methods for increased security
Kazuki Takeda, Youichi Takashima (Kaishi Professional Univ) EMM2023-81
Password authentication is used as an authentication method for various services, and while ID+password authentication i... [more] EMM2023-81
pp.7-12
IN, IA
(Joint)
2023-12-22
15:40
Hiroshima Satellite Campus Hiroshima A Cooperation Method for Countermeasure against DDoS Attacks in CDNs Interconnected by CDNI
Kazuki Takashima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2023-55
Currently, CDNs are one of major targets of DDoS attacks.
CDNs in CDNI, which aims to interconnect various CDNs for con... [more]
IA2023-55
pp.59-66
QIT
(2nd)
2023-12-17
17:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
An Effective Countermeasure against Time-Shift Attack and Comprehensive Analyses of Decoy-State QKD under Finite-Size Effects
Toshitsugu Kato, Atsushi Okamoto, Akihisa Tomita (Hokkaido Univ.)
One factor hindering the practical implementation of quantum cryptography is the vulnerability to eavesdropping attacks ... [more]
ICM, NS, CQ, NV
(Joint)
2023-11-21
09:30
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
Fallback control based false injection attack defense mechanism for managed potential-based routing
Tasuku Nagata, Naomi Kuze (Osaka Univ.) NS2023-109
Due to the rapid growth of information networks, self-organization is a promising approach for controlling network
syst... [more]
NS2023-109
pp.1-6
ICM, NS, CQ, NV
(Joint)
2023-11-21
13:15
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
[Encouragement Talk] Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] NS2023-114
pp.20-25
ICSS 2023-11-16
13:25
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Real time detection for replay-attack communication in control system
Koushi Nishi, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu University) ICSS2023-52
Attacks on control system in factory and power plant are increasing every year. Therefore, System that monitor communica... [more] ICSS2023-52
pp.7-14
ICSS 2023-11-16
15:20
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device
Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] ICSS2023-56
pp.35-41
ICSS 2023-11-16
16:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Security Analysis of MP-LWE using Weighted Lattice Reduction
Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] ICSS2023-57
pp.42-48
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-16
13:20
Kumamoto Civic Auditorium Sears Home Yume Hall
(Primary: On-site, Secondary: Online)
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
pp.101-105
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-17
09:35
Kumamoto Civic Auditorium Sears Home Yume Hall
(Primary: On-site, Secondary: Online)
Backside Side-Channel Attack by Silicon Substrate Voltage and Simulation
Rikuu Hasegawa, Kazuki Monta, Takuya Watatsumi, Takuji Miki, Makoto Nagata (Kobe Univ) VLD2023-63 ICD2023-71 DC2023-70 RECONF2023-66
Integrated circuit (IC) chips equipped with cryptographic circuits are vulnerable to side-channel attacks, which use exp... [more] VLD2023-63 ICD2023-71 DC2023-70 RECONF2023-66
pp.173-177
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-17
10:00
Kumamoto Civic Auditorium Sears Home Yume Hall
(Primary: On-site, Secondary: Online)
Derivation of secret keys by differential fault analysis using backside voltage fault injection
Yusuke Hayashi, Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) VLD2023-64 ICD2023-72 DC2023-71 RECONF2023-67
Lasers have been the leading method of fault injection in fault injection attacks on cryptographic integrated circuit (I... [more] VLD2023-64 ICD2023-72 DC2023-71 RECONF2023-67
pp.178-181
ICD, HWS 2023-10-31
14:20
Mie  
(Primary: On-site, Secondary: Online)
Evaluation of Time-to-Digital Converter in Laser Fault Injection Detection on FPGA
Shungo Hayashi, Junichi Sakamoto (YNU/AIST), Masaki Chikano, Tsutomu Matsumoto (YNU) HWS2023-56 ICD2023-35
Fault injection attacks are attacks that intentionally introduce faults into a running device in order to expose interna... [more] HWS2023-56 ICD2023-35
pp.10-15
ICD, HWS 2023-10-31
15:25
Mie  
(Primary: On-site, Secondary: Online)
CPA ToggleToggle-based Simulation against Multiplier for Pairingairing-based Cryptography
Saito Kikuoka, Ikeda Makoto (Tokyo Univ.) HWS2023-58 ICD2023-37
Pairing-based cryptography is more secure than RSA with a shorter key length, but it is computationally expensive and mo... [more] HWS2023-58 ICD2023-37
pp.20-25
MW, EMCJ, EST, IEE-EMC [detail] 2023-10-19
13:10
Yamagata Yamagata University
(Primary: On-site, Secondary: Online)
An Application of Genetic Algorithms for XSS Attack Payload Generation and WAF Evaluation
Yu Funahashi, Hideaki Kimura (Chubu Univ) EMCJ2023-43 MW2023-97 EST2023-70
We propose a method of generating and evolving malicious scripts (payloads) used in cross-site scripting (XSS) attacks b... [more] EMCJ2023-43 MW2023-97 EST2023-70
pp.42-45
MIKA
(3rd)
2023-10-11
14:30
Okinawa Okinawa Jichikaikan
(Primary: On-site, Secondary: Online)
[Poster Presentation] Detecting Poisoning Attacks Using Adversarial Examples in Deep Phishing Detection
Koko Nishiura, Tomotaka Kimura, Jun Cheng (Doshisha Univ.)
In recent years, the convenience of online services has greatly improved, but the number of phishing scams has skyrocket... [more]
 Results 21 - 40 of 728 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan